Logo Passei Direto
Buscar
Material
páginas com resultados encontrados.
páginas com resultados encontrados.
left-side-bubbles-backgroundright-side-bubbles-background

Experimente o Premium!star struck emoji

Acesse conteúdos dessa e de diversas outras disciplinas.

Libere conteúdos
sem pagar

Ajude estudantes e ganhe conteúdos liberados!

left-side-bubbles-backgroundright-side-bubbles-background

Experimente o Premium!star struck emoji

Acesse conteúdos dessa e de diversas outras disciplinas.

Libere conteúdos
sem pagar

Ajude estudantes e ganhe conteúdos liberados!

left-side-bubbles-backgroundright-side-bubbles-background

Experimente o Premium!star struck emoji

Acesse conteúdos dessa e de diversas outras disciplinas.

Libere conteúdos
sem pagar

Ajude estudantes e ganhe conteúdos liberados!

left-side-bubbles-backgroundright-side-bubbles-background

Experimente o Premium!star struck emoji

Acesse conteúdos dessa e de diversas outras disciplinas.

Libere conteúdos
sem pagar

Ajude estudantes e ganhe conteúdos liberados!

left-side-bubbles-backgroundright-side-bubbles-background

Experimente o Premium!star struck emoji

Acesse conteúdos dessa e de diversas outras disciplinas.

Libere conteúdos
sem pagar

Ajude estudantes e ganhe conteúdos liberados!

left-side-bubbles-backgroundright-side-bubbles-background

Experimente o Premium!star struck emoji

Acesse conteúdos dessa e de diversas outras disciplinas.

Libere conteúdos
sem pagar

Ajude estudantes e ganhe conteúdos liberados!

Prévia do material em texto

LaBrea.py
ShowMeThePackets
VisualSniff
DeepBlueCLI
"WhatsMyName"
untappdScraper
Espial
flare
VulnWhisperer
Log Campaign
Update-VMs
QRadar Threat 
Intelligence
DNSSpoof
Misc
Freq Server
Domain Stats
API-ify
Reassembler
SET-KBLED
rastrea2r
PAE
DAD
Silky
CyberCPR
Puma Scan
Serverless Prey
CHAPS
ControlThings
Human Metrics Matrix
Risk Definitions
Presenting to BOD
NIST CSF+
SIFT Workstation
REMnux
SOF-ELK
EZ Tools
SRUM-DUMP
ESE Analyst
Werejugo
Aurora IR
APOLLO
AmcacheParser
AppCompatCacheParser
bstrings
EZViewer
EvtxECmd
Hasher
JLECmd
JumpList Explorer
LECmd
MFTECmd
MFTExplorer
PECmd
RBCmd
RecentFileCacheParser
Registry Explorer
RECmd
SDB Explorer
ShellBags Explorer
SBECmd
Timeline Explorer
VSCMount
WxTCmd
iisGeoLocate
KAPE
TimeApp
XWFIM
Get-ZimmermanTools
MacMRU
The Pyramid of Pain
Hunting Maturity Model
"kobackupdec"
dpapilab
decwindbx
hotoloti
ios_bfu_triage
unssz
w10pfdecomp
sigs.py
mac_robber.py
docker_mount.py
tln_parse.py
sqlparse.py
onion_peeler.py
quicklook_parser
chrome_parse.py
parse_mftdump.py
GA-Parser.py
GA Cookie Cruncher
"safari_parser.py"
thunderbird_parser.py
LMG
DFIS
analyzeEXT
Linewatch
EmuRoot
The C2 Matrix
KillerBee
KillerZee
BitFit
PPTXIndex
PlistSubtractor
PPTXSanity
DynaPstalker
PPTXUrls
NM2LP
MFSmartHack
BTFind
CoWPAtty
PCAPHistogram
EAPMD5Pass
Asleap
TIBTLE2Pcap
Bluecrypt
evtxResourceIDGaps
Slingshot
EAP-MD5-Crack
Digestive
Autocrack
CrackMapExec
SILENTTRINITY
SprayingToolkit
Red Baron
WitnessMe
OffensiveDLR
GCat
MITMf
DHCPShock
wiki-dictionary-creator
Voltaire 
Subterfuge
Prismatica
Diagon
Oculus
Tiberium
Cryptbreaker
Acheron
Gryffindor
Mailsniper for Gmail
ads-payload
"powercat"
Emergence
heimdall
Kerberoasting
Pause-Process
LaBrea.py
Modern implementation of LaBreay Tarpit in Python/Scapy. LaBrea allows you to set up a 
host that can take over all unused addresses within an IPv4 subnet, creating a low interaction 
honeypot (of sorts) for network worms and scans. 
David Hoelzer
ShowMeThePackets
Collection of IDS/Network Monitoring scripts and tools covering things from data collection 
through analysis.
VisualSniff
A simple commnuications visualization tool for Macos written in Objective-C. Visualizes 
communicating hosts, volume, and directionality of data.
DeepBlueCLI A PowerShell Module for Threat Hunting via Windows Event Log. Eric Conrad
WhatsMyName OSINT/recon tool for user name enumeration. JSON file that is used in Spiderfoot and 
Recon-ng modules.
Micah Hoffman
untappdScraper
OSINT tool for scraping data from the untappd.com social media site.
Micah Hoffman & 
Brandon Evans
Espial OSINT tool for asset identification, service validation and vulnerability detection. Serge Borso
flare
Helps to find command and control beacons against data already ingested into Elasticsearch 
(supports netflow, Zeek, and likely any standard connection log).
Austin Taylor & Justin 
Henderson
VulnWhisperer
Aggregates vulnerability data and lets you report off it with ELK and allows tagging things 
such as PIC, HIPAA, critical asset, etc. Supports adding a score called residual_risk score 
which allows you to document what you feel the risk really is.
Log Campaign
Scheduled task framework for automatic baselining and logging based on differences 
between baselines. Logging can be direct to a syslog server or to local EVTX. Custom EVTX 
channel is supported and log output can be plaintext or JSON.
Justin Henderson
Update-VMs
Automatic framework for snapshotting VMware VMs and patching them. Supports custom 
health checks per VM with automatic rollback of failed healthcheck and default healthcheck is 
to see if the server comes back online.
Josh Johnson
QRadar Threat 
Intelligence
Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. 
Search Your Environment For Malicious Ips. Nik Alleyne
DNSSpoof Script to perform and teach how easy it is to build a DNS Spoofing tool using scapy.
Misc Powershell & 
VBScript
Hundreds of PowerShell and VBScript scripts for tasks large and small related to Microsoft 
product security. Jason Fossen
Freq Server
A Web server that integrates with SEIM systems and identifies hosts being used for 
Command and control by identifying domains being used for Command and Control. The 
tools uses character frequency analysis to identify random hostnames. 
Mark Baggett
Domain Stats
A SEIM Integration tool that monitors DNS hostnames used by your network to identify first 
contact with new domains and contact with new domains that have been established in the 
last 2 years, effective in identifying malicious actors.
API-ify
A Web server that provides an API that allows network defenders to consume the output of 
any Linux based command and integrate it into their ELK stack, splunk or other SEIM tools.
Mark Baggett
Reassembler
A tool that allows network defenders to reassemble and view packets using the 5 widely used 
fragment reassembly policies commonly found in Intrusion Detection Systems.
SET-KBLED
A Powershell script that will allow you to set the Keyboard LED Color to the color of your 
Clevo chipset based Keyboard. When used with event log actions you have a visible early 
warning system. Example, have keyboards turn red when a virus is detected.
Rastrea2r
Rastrea2r (pronounced "rastreador" - hunter- in Spanish) is a multi-platform open source tool 
that allows incident responders and SOC analysts to triage suspect systems and hunt for 
Indicators of Compromise (IOCs) across thousands of endpoints in minutes. 
Ismael Valenzuela
PAE
A high performance statistical analysis tool for packet headers and data. Excellent for 
anomaly detection, threat hunting, and beacon (protocol) detection. Supports visualization 
through accompanying Python script.
David Hoelzer
DAD
Large scale log aggregation and analysis SIEM supporting the ability to create correlation 
scripts based on signatures and on correlations. Supports aggregation of syslog, Windows 
Event Logs, and any other text based log format.
Silky Web based GUI for easy interaction with SiLK based NetFlow respositories.
CyberCPR
IR Management platform for secure comms and tracking of the incident and evidence, with 
immutable chat, comms, hashed and encrypted central evidence files. Allowing analysts to 
streamline protecting their evidence and plans for network or system remediation. 
Steve Armstrong
https://github.com/dhoelzer/ShowMeThePackets/blob/master/Scapy/LaBrea.py
https://github.com/dhoelzer/ShowMeThePackets
https://github.com/dhoelzer/VisualSniff
https://github.com/sans-blue-team/DeepBlueCLI
https://github.com/WebBreacher/WhatsMyName
https://github.com/WebBreacher/untappdScraper
https://www.spydersec.com/Espial
https://github.com/HASecuritySolutions/flare
https://github.com/HASecuritySolutions/VulnWhisperer
https://github.com/HASecuritySolutions/LogCampaign
https://github.com/HASecuritySolutions/Update-VMs
https://github.com/SecurityNik/QRadar---Threat-Intelligence-On-The-Cheap
https://drive.google.com/file/d/0B0qDfJ30s2I9bXVwX3VXNzBOMzA/edit
https://github.com/EnclaveConsulting
http://github.com/markbaggett/freq
http://github.com/markbaggett/domainstats
http://github.com/markbaggett/apiify
http://github.com/markbaggett/reassembler
https://github.com/MarkBaggett/MarkBaggett/blob/master/set-kbled.ps1
https://github.com/rastrea2r/rastrea2r
https://github.com/dhoelzer/ShowMeThePackets/tree/master/PAE
https://github.com/dhoelzer/DAD
https://github.com/dhoelzer/Silky
https://www.cybercpr.com/
SIFT Workstation
The SIFT® demonstrates that advanced incident response capabilities and deep dive digital forensic 
techniques to intrusions can be accomplished using cutting-edge open-source tools that are freely 
available and frequently updated. Rob Lee
REMnux
REMnux® is a free Linux toolkit for assisting malware analysts with reverse-engineering malicious 
software.This lightweight distro incorporates many tools for analyzing Windows and Linux malware 
and examining browser-based threats. Lenny Zeltser
SOF-ELK
SOF-ELK® is a “big data analytics” platform focused on the typical needs of computer forensic 
investigators/analysts and information security operations personnel. The platform is a customized 
build of the open source Elastic stack to make large scale analysis easier. Phil Hagen
EZ Tools
A suite of open source digital forensics tools that can be used in a wide variety of investigations 
including cross validation of tools, providing insight into technical details not exposed by other tools, 
and more. 
Eric 
Zimmerman
AmcacheParser Amcache.hve parser with lots of extra features. Handles locked files.
AppCompatCacheParser AppCompatCache aka ShimCache parser. Handles locked files.
bstrings Find them strings yo. Built in regex patterns. Handles locked files.
EZViewer
Standalone, zero dependency viewer for .doc, .docx, .xls, .xlsx, .txt, .log, .rtf, .otd, .htm, .html, .mht, 
.csv, and .pdf. Any non-supported files are shown in a hex editor (with data interpreter!).
EvtxECmd
Event log (evtx) parser with standardized CSV, XML, and json output! Custom maps, locked file 
support, and more!
Hasher Hash all the things
JLECmd Jump List parser
JumpList Explorer GUI based Jump List viewer
LECmd Parse lnk files
MFTECmd $MFT, $Boot, $J, $SDS, and $LogFile (coming soon) parser. Handles locked files
MFTExplorer $MFT, $Boot, $J, $SDS, and $LogFile (coming soon) parser.
PECmd Prefetch parser
RBCmd Recycle Bin artifact (INFO2/$I) parser
RecentFileCacheParser RecentFileCache parser
Registry Explorer Registy viewer with searching, multi-hive support, plugins, and more. Handles locked files
RECmd Registy viewer with searching, multi-hive support, plugins, and more. Handles locked files
SDB Explorer Shim database GUI
ShellBags Explorer GUI for browsing shellbags data. Handles locked files
SBECmd CLI for analyzing shellbags data. 
Timeline Explorer View CSV and Excel files, filter, group, sort, etc. with ease
VSCMount Mount all VSCs on a drive letter to a given mount point
WxTCmd Windows 10 Timeline database parser
KAPE
Kroll Artifact Parser/Extractor: Flexible, high speed collection of files as well as processing of files. 
Many many features (SHORT: Rapid Triage Forensic Artifact Acquisition and Processing Tool)
iisGeoLocate Geolocate IP addresses found in IIS logs
TimeApp
A simple app that shows current time (local and UTC) and optionally, public IP address. Great for 
testing
XWFIM X-Ways Forensics installation manager
Get-ZimmermanTools PowerShell script to auto discover and update everything above.
APOLLO
Apple Pattern of Life Lazy Output'er (APOLLO) extracts and correlates data from numerous 
databases, then organizes it to show a detailed event log of application usage, device status, and 
many other pattern-of-life artifacts from Apple devices. 
Sarah 
Edwards
MacMRU Mac MRU parser
The Pyramid of Pain
The Pyramid of Pain is a conceptual model for the effective use of Cyber Threat Intelligence in threat 
detection operations, with a particular emphasis on increasing the adversaries' cost of operations.
David J. 
Bianco
Hunting Maturity Model
The Hunting Maturity Model (HMM) is a simple model for evaluating an organization's threat hunting 
capability. It provides not only a "where are we now?" metric, but also a roadmap for program 
improvement. 
https://digital-forensics.sans.org/community/downloads
https://remnux.org/
https://github.com/philhagen/sof-elk
https://digital-forensics.sans.org/community/downloads/digital-forensics-tools
https://f001.backblazeb2.com/file/EricZimmermanTools/AmcacheParser.zip
https://f001.backblazeb2.com/file/EricZimmermanTools/AppCompatCacheParser.zip
https://f001.backblazeb2.com/file/EricZimmermanTools/bstrings.zip
https://f001.backblazeb2.com/file/EricZimmermanTools/EZViewer.zip
https://f001.backblazeb2.com/file/EricZimmermanTools/EvtxExplorer.zip
https://f001.backblazeb2.com/file/EricZimmermanTools/hasher.zip
https://f001.backblazeb2.com/file/EricZimmermanTools/JLECmd.zip
https://f001.backblazeb2.com/file/EricZimmermanTools/JumpListExplorer.zip
https://f001.backblazeb2.com/file/EricZimmermanTools/LECmd.zip
https://f001.backblazeb2.com/file/EricZimmermanTools/MFTECmd.zip
https://f001.backblazeb2.com/file/EricZimmermanTools/MFTExplorer.zip
https://f001.backblazeb2.com/file/EricZimmermanTools/PECmd.zip
https://f001.backblazeb2.com/file/EricZimmermanTools/RBCmd.zip
https://f001.backblazeb2.com/file/EricZimmermanTools/RecentFileCacheParser.zip
https://f001.backblazeb2.com/file/EricZimmermanTools/RegistryExplorer_RECmd.zip
https://f001.backblazeb2.com/file/EricZimmermanTools/RegistryExplorer_RECmd.zip
https://f001.backblazeb2.com/file/EricZimmermanTools/SDBExplorer.zip
https://f001.backblazeb2.com/file/EricZimmermanTools/ShellBagsExplorer.zip
https://f001.backblazeb2.com/file/EricZimmermanTools/ShellBagsExplorer.zip
https://f001.backblazeb2.com/file/EricZimmermanTools/TimelineExplorer.zip
https://f001.backblazeb2.com/file/EricZimmermanTools/VSCMount.zip
https://f001.backblazeb2.com/file/EricZimmermanTools/WxTCmd.zip
https://learn.duffandphelps.com/kape?utm_campaign=2019_cyberitbn-KAPE-launch&utm_source=kroll&utm_medium=referral&utm_term=kape-gui-blogpost
https://f001.backblazeb2.com/file/EricZimmermanTools/iisGeolocate.zip
https://f001.backblazeb2.com/file/EricZimmermanTools/TimeApp.zip
https://f001.backblazeb2.com/file/EricZimmermanTools/XWFIM.zip
https://f001.backblazeb2.com/file/EricZimmermanTools/Get-ZimmermanTools.zip
https://github.com/mac4n6/APOLLO
https://github.com/mac4n6/macMRU-Parser
https://bit.ly/PyramidOfPain
https://bit.ly/HuntingMaturityModel
kobackupdec
The kobackupdec is a Python3 script to decrypt Huawei HiSuite or KoBackup (Android app) backups.
Francesco 
Picasso
dpapilab
Python toolkit based on dpapick to decrypt, online and offline, DPAPI protected blobs, Windows Vaults 
included.
decwindbx Windows toolkit to decrypt Dropbox .dbx databases.
hotoloti Zena Forensics blog scripts set (regripper plugins, volatility mimikatz/rekall plugin, event log, etc.) 
unssz
Python script to decrypt Samsung / Seagate Secure Zone crypto containers (without knowing the 
password...).
w10pfdecomp Windows 10 Prefetch (native) decompression
ios_bfu_triage Bash script to extract data from a "chekcra1ned" iOS device. Mattia Epifani
sigs.py Generate md5, sha1, sha256, sha512, sha3-384 signatures from files (potentially recursively)
Jim Clausing
mac_robber.py mac_robber rewritten in python
docker_mount.py Script to read-only mount docker layered filesystems (currently supports underlying aufs and overlay2)
tln_parse.py
Python script to replace parse.exe in Mari's KAPE mini-timeline workflow to give me good yyyy-dd-mm 
UTC timestamps.
sqlparse.py Python and EXE to recover delete entries in SQLite Databases
Mari DeGrazia
onion_peeler.py Python tool to batch query IP addresses to see if they are Tor exit nodes
quicklook_parser
Python tool to parse the Mac QuickLook index.sqlite database. Contains information about thumbnails 
generted on a Mac.
chrome_parse.py Parse Chrome history and downloads into TSV or TLN format.
parse_mftdump.py Parses the output of mftdump.exe to bodyfile format
GA-Parser.py Python script to parse out Google Analytic Values from E01, RAM, etc.
GA Cookie Cruncher Parses out Google Analytic values for IE, FireFox, Chrome and Safari.
safari_parser.py Parses Safari history, downloads, bookmarks and topsites.
thunderbird_parser.py Parses out email from the Thunderbird client, to inlude deleted emails.
SRUM-DUMP
Windows GUI Forensics tool produces XLSX spreadsheet with detailed information on all processes 
that have run in the last 30 days on Windows computers. 
Mark BaggettESE Analyst
Command line based tool that dumps and analyzes databases used on Windows systems that stores 
various forensics information. Plugins are used to dump differenttypes of data. 
Werejugo
A Windows Forensics tool that analyzes the registry, event logs and wireless network configurations to 
identify physical locations of where the laptop has been used.
Aurora IR
Spreadsheet of Doom on steroids with some nice little graphing features, task tracking, and much 
more. I'll be adding new features soon. Mathias Fuchs
LMG Script to automate memory capture and profile creation for Linux systems
Hal Pomeranz
DFIS EXT3 file recovery tools, timelining tools, and more
analyzeEXT Recover EXT filesystem info from carved directory blocks
Linewatch Spot outliers in large data runs
Rastrea2r
Rastrea2r (pronounced "rastreador" - hunter- in Spanish) is a multi-platform open source tool that 
allows incident responders and SOC analysts to triage suspect systems and hunt for Indicators of 
Compromise (IOCs) across thousands of endpoints in minutes. 
Ismael 
Valenzuela
PAE
A high performance statistical analysis tool for packet headers and data. Excellent for anomaly 
detection, threat hunting, and beacon (protocol) detection. Supports visualization through 
accompanying Python script.
David Hoelzer
DAD
Large scale log aggregation and analysis SIEM supporting the ability to create correlation scripts 
based on signatures and on correlations. Supports aggregation of syslog, Windows Event Logs, and 
any other text based log format.
Silky Web based GUI for easy interaction with SiLK based NetFlow repositories.
CyberCPR
IR Management platform for secure comms and tracking of the incident and evidence. With 
immutable chat, comms, hashed and encrypted central evidence files. The platform unburdens 
analysts from having to think about protecting their evidence and plans for network or system 
remediation. 
Steve 
Armstrong
https://github.com/RealityNet/kobackupdec
https://github.com/dfirfpi/dpapilab
https://github.com/dfirfpi/decwindbx
https://github.com/RealityNet/hotoloti
https://gist.github.com/dfirfpi/2602b726af1b944efa723d34b624ad88
https://gist.github.com/dfirfpi/113ff71274a97b489dfd
https://github.com/RealityNet/ios_bfu_triage
https://github.com/clausing/scripts/blob/master/sigs.py
https://github.com/att/docker-forensics/blob/master/mac-robber.py
https://github.com/att/docker-forensics/blob/master/docker-mount.py
https://github.com/clausing/scripts/blob/master/tln_parse.py
https://github.com/mdegrazia/SQLite-Deleted-Records-Parser
https://github.com/mdegrazia/OnionPeeler
https://github.com/mdegrazia/OSX-QuickLook-Parser
https://github.com/mdegrazia/Chrome-Parse
https://github.com/mdegrazia/mft-parse
https://github.com/mdegrazia/Google-Analytic-Parser
https://github.com/mdegrazia/Google-Analytic-Cookie-Cruncher
https://github.com/mdegrazia/Safari-Internet-History-Parser
https://github.com/mdegrazia/Safari-Internet-History-Parser
https://github.com/mdegrazia/Safari-Internet-History-Parser
https://github.com/mdegrazia/Thunderbird-Email-Parser
http://github.com/markbaggett/srum-dump
http://github.com/markbaggett/ese-analyst
http://github.com/markbaggett/werejugo
https://www.cyberfox.blog/aurora-incident-response/
file:///C:/Users/kmarshall/Documents/Curriculum Overall/Free/github.com/halpomeranz
file:///C:/Users/kmarshall/Documents/Curriculum Overall/Free/github.com/halpomeranz
file:///C:/Users/kmarshall/Documents/Curriculum Overall/Free/github.com/halpomeranz
file:///C:/Users/kmarshall/Documents/Curriculum Overall/Free/github.com/halpomeranz
https://github.com/rastrea2r/rastrea2r
https://github.com/dhoelzer/ShowMeThePackets/tree/master/PAE
https://github.com/dhoelzer/DAD
https://github.com/dhoelzer/Silky
https://www.cybercpr.com/
Slingshot
Slingshot is an Ubuntu-based Linux distribution with the MATE Desktop Environment built for 
use in the SANS penetration testing curriculum and beyond. Designed to be stable, reliable 
and lean, Slingshot is built with Vagrant and Ansible. 
Ryan O'Grady
The C2 Matrix
Matrix of Command and Control Frameworks for Penetration Testing, Red Teaming, and 
Purple Teaming
Jorge Orchilles
Kerberoasting
Portions of Kerberos tickets may be encrypted using the password hash of the target service, 
and is thus vulnerable to offline Brute Force attacks that may expose plaintext credentials.
Tim Medin
KillerBee
KillerBee is a framework, programming API,and suite of tools for testing the security of 
ZigBee wireless networks
Joshua Wright
KillerZee
KillerZee is a framework, programming API,and suite of tools for testing the security of Z-
Wave wireless networks
BitFit BitFit is a tool for guaranteeing an integrity check for distributed data files.
PPTXIndex PPTXIndex generates a Microsoft Word indexed document from PowerPoint PPTX files.
PlistSubtractor PlistSubtractor simplifies the process of assessing nested plist data
PPTXSanity PPTXSanity evaluates all of the links in a PowerPoint file to check for dead links
DynaPstalker
DynaPstalker assists when fuzzing a Windows process by color-coding reached blocks for 
use in IDA Pro.
PPTXUrls PPTXUrls generates a HTML report of all links in one or more PowerPoint files.
NM2LP NM2LP converts NetMon wireless packet capture data to libpcap format.
MFSmartHack
MFSmartHack is a suite of tools for hacking MIFARE DESFire and ULC high frequency RFID 
cards
BTFind
BTFind is a graphical and audio interface for tracking the location of Bluetooth and Bluetooth 
Low Energy devices
CoWPAtty CoWPAtty is a WPA2-PSK password cracking tool.
PCAPHistogram
PCAPHistogram asseses the payload of libpcap packet capture data, generating a histogram 
to characterize data entropy.
EAPMD5Pass EAPMD5Pass is a password cracking tool for EAP-MD5 packet captures.
Asleap Aleap is a Cisco LEAP and generic MS-CHAPv2 password cracking tool.
TIBTLE2Pcap
TIBTLE2Pcap converts Bluetooth and Bluetooth Low Energy packet captures using the 
proprietary TI SmartRF format into libpcap-compatible files.
Bluecrypt
Bluecrypt is a simple implementation of the Bluetooth authentication cryptographic functions 
including E0, E21 and E22. Includes some wrapper functions to make Bluetooth 
authentication functions a little simpler.
evtxResourceIDGaps
evtxResourceIDGaps is a script to evaluate Windows EVTX logging data to identify evidence 
of tampered loging data.
EAP-MD5-Crack A python implementation of an EAP authentication cracking. PCAP in, password out. Mark Baggett
Digestive Dictionary cracking tool for HTTP Digest challenge/response hashes Eric Conrad
Autocrack
This python script is a Hashcat wrapper to help automate the cracking process. The script 
includes multiple functions to select a set of wordlists and rules, as well as the ability to run a 
bruteforce attack, with custom masks, before the wordlist/rule attacks.
Timothy McKenzie
CrackMapExec
A swiss army knife for pentesting internal networks, allows pentesters to perform post-
exploitation at scale.
Marcello Salvati
SILENTTRINITY
A modern, asynchronous, multiplayer & multiserver C2/post-exploitation framework powered 
by Python 3 and .NETs DLR.
SprayingToolkit
Scripts to make password spraying attacks against Lync/S4B & OWA a lot quicker, less 
painful and more efficient
Red Baron Automate creating resilient, disposable, secure and agile infrastructure for Red Teams
WitnessMe
Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless 
Chrome/Chromium) and provides some extra bells & whistles to make life easier.
OffensiveDLR Toolbox containing research notes & PoC code for weaponizing .NET's DLR
GCat A PoC backdoor that uses Gmail as a C&C server
MITMf Framework for Man-In-The-Middle attacks
DHCPShock Spoofs a DHCP server and exploits all clients vulnerable to the 'ShellShock' bug.
wiki-dictionary-creator
Creates a wordlist based on a Wikipedia sites articles. Allows you to select Wikipedia 
language. Creates wordlists based on the article titles. 
Chris Dale
VoIP Hopper
VoIP Hopper is a network infrastructure penetration testing tool to test the (in)security of 
VLANS as well as mimicthe behavior of IP Phones to automatically VLAN Hop and 
demonstrate risks within IP Telephony network infrastructures.
Jason Ostrom
https://www.sans.org/slingshot-vmware-linux
https://www.thec2matrix.com/
https://github.com/nidem/kerberoast
https://github.com/riverloopsec/killerbee
https://github.com/joswr1ght/killerzee
https://github.com/joswr1ght/bitfit
https://github.com/joswr1ght/pptxindex
https://github.com/joswr1ght/plistsubtractor
https://github.com/joswr1ght/pptxsanity
https://github.com/joswr1ght/dynapstalker
https://github.com/joswr1ght/pptxurls
https://github.com/joswr1ght/nm2lp
https://github.com/joswr1ght/mfsmarthack
https://github.com/joswr1ght/btfind
https://github.com/joswr1ght/cowpatty
https://github.com/joswr1ght/pcaphistogram
https://github.com/joswr1ght/eapmd5pass
https://github.com/joswr1ght/asleap
https://github.com/joswr1ght/tibtle2pcap
https://www.willhackforsushi.com/?page_id=61
https://gist.github.com/joswr1ght/3d6b18b2150bd3ce1dd10d00ca2029b0
https://github.com/MarkBaggett/MarkBaggett/blob/master/eapmd5crack.py
https://github.com/eric-conrad/digestive
https://github.com/timbo05sec/autocrack
https://github.com/byt3bl33d3r/CrackMapExec
https://github.com/byt3bl33d3r/SILENTTRINITY
https://github.com/byt3bl33d3r/SprayingToolkit
https://github.com/byt3bl33d3r/Red-Baron
https://github.com/byt3bl33d3r/WitnessMe
https://github.com/byt3bl33d3r/OffensiveDLR
https://github.com/byt3bl33d3r/gcat
https://github.com/byt3bl33d3r/MITMf
https://github.com/byt3bl33d3r/DHCPShock
https://github.com/ChrisAD/wiki-dictionary-creator
https://github.com/iknowjason/voiphopper
Voltaire 
Voltaire is a web-based indexing tool for GIAC certification examinations. Creating an index 
with Voltaire is a three phase process involving: documentation/note-taking, sorting & 
normalization, and word processing. This readme is meant to guide users through the 
process.
Matthew Toussain
Subterfuge
Subterfuge is a Framework to take the arcane art of Man-in-the-Middle Attack and make it as 
simple as point and shoot. It demonstrates vulnerabilities in the ARP Protocol by harvesting 
credentials that go across the network, and even exploiting machines through race 
conditions.
Prismatica
Project Prismatica is a focused framework for Command and Control that is dedicated to 
extensibility. Our core objective is to provide a convenient platform with modular Transports, 
Backends, and Implants to enable rapid retooling opportunities and enhance Red Team ops.
Diagon
The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, 
Gryffindor, and Slytherin remote access tools (RATs).
Oculus
Oculus is a malleable python-based C2 system allowing for instantiation of listeners for the 
purpose of communication with remote access tools (RATs).
Tiberium A Command and Control scanning tool
Gryffindor The Gryffindor RAT was released at Derbycon 2018.
Mailsniper for Gmail
MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange 
and Gsuite environment for specific terms (passwords, insider intel, network architecture 
information, etc.). It can be used as a non-administrative user to search their own email, or 
by an Exchange administrator to search the mailboxes of every user in a domain.
Emergence
The Emergence fabric is an interface where interaction and integration of disparate 
information security subsystems gain combined intelligence.
Acheron
Acheron is a RESTful vulnerability assessment and management framework built around 
search and dedicated to terminal extensibility.
Matthew Toussain and 
Geoffrey Pamerleau
Cryptbreaker
Cryptbreaker is web application that utilizes Amazon Web Services (AWS) to perform cloud-
based cracking of LM and NTLM hashes (the primary storage mechanism for hashes in a 
Windows Domain environment). 
Geoffrey Pamerleau
ads-payload
Powershell script which will take any payload and put it in the a bat script which delivers the 
payload. The payload is delivered using environment variables, alternating-data-streams and 
wmic.
Chris Dale
powercat Netcat implementation in PowerShell 2.0 to allow maximum portability on all PowerShell 
enabled hosts.
Mick Douglas
Pause-Process
PowerShell script which allows one to pause/unpause a running application. Makes use of 
existing OS functionality so there is no need to install any additional components. Can be 
used to allow defenders to respond at a lower threshold. 
heimdall
Python tool to distribute commands across many cloud instances. Originally intended for 
highly distributed recon scanning (non evasive, just performant). Basically wrapper around 
Terraform
Derek Rook
EmuRoot
Android_Emuroot is a Python script that allows to grant root privileges to Google API 
Playstore emulator shells on the fly to help Reverse Engineers to go deeper into their 
investigations.
Mouad Abouhali
Puma Scan
Puma Scan is an open source software security analyzer for C# applications. Puma Scan provides a Visual Studio 
extension for scanning source code in the development environment and displaying vulnerabilities as spell check and 
compiler warnings. 
Eric Johnson
Serverless Prey
Serverless Prey is a collection of serverless functions (FaaS) for GCP Functions, Azure Functions, and AWS Lambda. Once 
launched to the environment and invoked, these functions establish a TCP reverse shell for the purposes of introspecting 
the container runtimes of the various function runtimes.
Eric Johnson / Brandon Evans
CHAPS
Configuration Hardening Assessment PowerShell Script (CHAPS) is a PowerShell script for checking system security 
settings where additional software and assessment tools, such as Microsoft Policy Analyzer, cannot be installed.
Don C. Weber
ControlThings
An umbrella project that includes several sub-projects, including a Linux distribution (ControlThings Platform) for conducting 
security assessments on ICS/IIoT environments and other tools to interact with various protocols and technologies including 
ctmodbus, ctserial, ctui, ctspi, cti2c, etc...
Justin Searle
Human Metrics Matrix Interactive matrix cataloging different types of human metrics, to include compliance, behavior, cultural and strategic
Lance SpitznerRisk Definitions Breakdown, definitions and examples of the three different variables of risk
Presenting to BOD Slide deck on how to prepare for and present to Board of Directors on Cybersecurity
NIST CSF+ Framework management tool - service catalog, 5-year plan Brian Ventura
https://voltaire.publickey.io/
https://github.com/Subterfuge-Framework
http://prismatica.io/
https://github.com/Project-Prismatica/Diagon
https://github.com/Project-Prismatica/Oculus
https://github.com/0sm0s1z/Tiberium
https://github.com/Project-Prismatica/Diagon
https://github.com/0sm0s1z/MailSniper
https://github.com/Project-Prismatica/Emergence
https://github.com/Acheron-VAF/Acheron
https://www.opensecurity.io/blog/quick-password-cracks-and-audits
https://github.com/ChrisAD/ads-payload
https://github.com/besimorhino/powercat
https://github.com/besimorhino/Pause-Process
https://gitlab.com/r00k/heimdall
https://github.com/airbus-seclab/android_emuroot
https://github.com/pumasecurity/puma-scan
https://github.com/pumasecurity/serverless-prey
https://github.com/cutaway-security/chaps
https://www.controlthings.io/
https://www.dropbox.com/sh/xhz114a0ptrwjb2/AAA9o37X_5qQ3nAig0ZG99_la?dl=0
https://www.dropbox.com/sh/xhz114a0ptrwjb2/AAA9o37X_5qQ3nAig0ZG99_la?dl=0
https://www.dropbox.com/sh/xhz114a0ptrwjb2/AAA9o37X_5qQ3nAig0ZG99_la?dl=0
https://github.com/brianwifaneye/NIST-CSF

Mais conteúdos dessa disciplina